You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dyn/compute_alpha.firewallPolicies.html
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -251,7 +251,7 @@ <h3>Method Details</h3>
251
251
The object takes the form of:
252
252
253
253
{ # Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
254
-
"action": "A String", # The Action to perform when the client connection triggers the rule. Can currently be either "allow" or "deny()" where valid values for status are 403, 404, and 502.
254
+
"action": "A String", # The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
255
255
"description": "A String", # An optional description for this resource.
256
256
"direction": "A String", # The direction in which this rule applies.
257
257
"disabled": True or False, # Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
@@ -639,7 +639,7 @@ <h3>Method Details</h3>
639
639
"ruleTupleCount": 42, # [Output Only] Total count of all firewall policy rule tuples. A firewall policy can not exceed a set number of tuples.
640
640
"rules": [ # A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a firewall policy, a default rule with action "allow" will be added.
641
641
{ # Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
642
-
"action": "A String", # The Action to perform when the client connection triggers the rule. Can currently be either "allow" or "deny()" where valid values for status are 403, 404, and 502.
642
+
"action": "A String", # The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
643
643
"description": "A String", # An optional description for this resource.
644
644
"direction": "A String", # The direction in which this rule applies.
645
645
"disabled": True or False, # Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
@@ -858,7 +858,7 @@ <h3>Method Details</h3>
858
858
An object of the form:
859
859
860
860
{ # Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
861
-
"action": "A String", # The Action to perform when the client connection triggers the rule. Can currently be either "allow" or "deny()" where valid values for status are 403, 404, and 502.
861
+
"action": "A String", # The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
862
862
"description": "A String", # An optional description for this resource.
863
863
"direction": "A String", # The direction in which this rule applies.
864
864
"disabled": True or False, # Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
@@ -959,7 +959,7 @@ <h3>Method Details</h3>
959
959
"ruleTupleCount": 42, # [Output Only] Total count of all firewall policy rule tuples. A firewall policy can not exceed a set number of tuples.
960
960
"rules": [ # A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a firewall policy, a default rule with action "allow" will be added.
961
961
{ # Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
962
-
"action": "A String", # The Action to perform when the client connection triggers the rule. Can currently be either "allow" or "deny()" where valid values for status are 403, 404, and 502.
962
+
"action": "A String", # The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
963
963
"description": "A String", # An optional description for this resource.
964
964
"direction": "A String", # The direction in which this rule applies.
965
965
"disabled": True or False, # Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
@@ -1168,7 +1168,7 @@ <h3>Method Details</h3>
1168
1168
"ruleTupleCount": 42, # [Output Only] Total count of all firewall policy rule tuples. A firewall policy can not exceed a set number of tuples.
1169
1169
"rules": [ # A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a firewall policy, a default rule with action "allow" will be added.
1170
1170
{ # Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
1171
-
"action": "A String", # The Action to perform when the client connection triggers the rule. Can currently be either "allow" or "deny()" where valid values for status are 403, 404, and 502.
1171
+
"action": "A String", # The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
1172
1172
"description": "A String", # An optional description for this resource.
1173
1173
"direction": "A String", # The direction in which this rule applies.
1174
1174
"disabled": True or False, # Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
@@ -1427,7 +1427,7 @@ <h3>Method Details</h3>
1427
1427
"ruleTupleCount": 42, # [Output Only] Total count of all firewall policy rule tuples. A firewall policy can not exceed a set number of tuples.
1428
1428
"rules": [ # A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a firewall policy, a default rule with action "allow" will be added.
1429
1429
{ # Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
1430
-
"action": "A String", # The Action to perform when the client connection triggers the rule. Can currently be either "allow" or "deny()" where valid values for status are 403, 404, and 502.
1430
+
"action": "A String", # The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
1431
1431
"description": "A String", # An optional description for this resource.
1432
1432
"direction": "A String", # The direction in which this rule applies.
1433
1433
"disabled": True or False, # Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
@@ -1601,7 +1601,7 @@ <h3>Method Details</h3>
1601
1601
The object takes the form of:
1602
1602
1603
1603
{ # Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
1604
-
"action": "A String", # The Action to perform when the client connection triggers the rule. Can currently be either "allow" or "deny()" where valid values for status are 403, 404, and 502.
1604
+
"action": "A String", # The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
1605
1605
"description": "A String", # An optional description for this resource.
1606
1606
"direction": "A String", # The direction in which this rule applies.
1607
1607
"disabled": True or False, # Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
Copy file name to clipboardExpand all lines: docs/dyn/compute_alpha.healthChecks.html
+18Lines changed: 18 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -183,6 +183,9 @@ <h3>Method Details</h3>
183
183
"region": "A String", # [Output Only] Region where the health check resides. Not applicable to global health checks.
184
184
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
185
185
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
186
+
"sourceRegions": [ # The list of cloud regions from which health checks are performed. If any regions are specified, then exactly 3 regions should be specified. The region names must be valid names of GCP regions. This can only be set for global health check. If this list is non-empty, then there are restrictions on what other health check fields are supported and what other resources can use this health check: - SSL, HTTP2, and GRPC protocols are not supported. - The TCP request field is not supported. - The proxyHeader field for HTTP, HTTPS, and TCP is not supported. - The checkIntervalSec field must be at least 30. - The health check cannot be used with BackendService nor with managed instance group auto-healing.
187
+
"A String",
188
+
],
186
189
"sslHealthCheck": {
187
190
"port": 42, # The TCP port number to which the health check prober sends packets. The default value is 443. Valid values are 1 through 65535.
188
191
"portName": "A String", # Not supported.
@@ -420,6 +423,9 @@ <h3>Method Details</h3>
420
423
"region": "A String", # [Output Only] Region where the health check resides. Not applicable to global health checks.
421
424
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
422
425
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
426
+
"sourceRegions": [ # The list of cloud regions from which health checks are performed. If any regions are specified, then exactly 3 regions should be specified. The region names must be valid names of GCP regions. This can only be set for global health check. If this list is non-empty, then there are restrictions on what other health check fields are supported and what other resources can use this health check: - SSL, HTTP2, and GRPC protocols are not supported. - The TCP request field is not supported. - The proxyHeader field for HTTP, HTTPS, and TCP is not supported. - The checkIntervalSec field must be at least 30. - The health check cannot be used with BackendService nor with managed instance group auto-healing.
427
+
"A String",
428
+
],
423
429
"sslHealthCheck": {
424
430
"port": 42, # The TCP port number to which the health check prober sends packets. The default value is 443. Valid values are 1 through 65535.
425
431
"portName": "A String", # Not supported.
@@ -507,6 +513,9 @@ <h3>Method Details</h3>
507
513
"region": "A String", # [Output Only] Region where the health check resides. Not applicable to global health checks.
508
514
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
509
515
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
516
+
"sourceRegions": [ # The list of cloud regions from which health checks are performed. If any regions are specified, then exactly 3 regions should be specified. The region names must be valid names of GCP regions. This can only be set for global health check. If this list is non-empty, then there are restrictions on what other health check fields are supported and what other resources can use this health check: - SSL, HTTP2, and GRPC protocols are not supported. - The TCP request field is not supported. - The proxyHeader field for HTTP, HTTPS, and TCP is not supported. - The checkIntervalSec field must be at least 30. - The health check cannot be used with BackendService nor with managed instance group auto-healing.
517
+
"A String",
518
+
],
510
519
"sslHealthCheck": {
511
520
"port": 42, # The TCP port number to which the health check prober sends packets. The default value is 443. Valid values are 1 through 65535.
512
521
"portName": "A String", # Not supported.
@@ -694,6 +703,9 @@ <h3>Method Details</h3>
694
703
"region": "A String", # [Output Only] Region where the health check resides. Not applicable to global health checks.
695
704
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
696
705
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
706
+
"sourceRegions": [ # The list of cloud regions from which health checks are performed. If any regions are specified, then exactly 3 regions should be specified. The region names must be valid names of GCP regions. This can only be set for global health check. If this list is non-empty, then there are restrictions on what other health check fields are supported and what other resources can use this health check: - SSL, HTTP2, and GRPC protocols are not supported. - The TCP request field is not supported. - The proxyHeader field for HTTP, HTTPS, and TCP is not supported. - The checkIntervalSec field must be at least 30. - The health check cannot be used with BackendService nor with managed instance group auto-healing.
707
+
"A String",
708
+
],
697
709
"sslHealthCheck": {
698
710
"port": 42, # The TCP port number to which the health check prober sends packets. The default value is 443. Valid values are 1 through 65535.
699
711
"portName": "A String", # Not supported.
@@ -811,6 +823,9 @@ <h3>Method Details</h3>
811
823
"region": "A String", # [Output Only] Region where the health check resides. Not applicable to global health checks.
812
824
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
813
825
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
826
+
"sourceRegions": [ # The list of cloud regions from which health checks are performed. If any regions are specified, then exactly 3 regions should be specified. The region names must be valid names of GCP regions. This can only be set for global health check. If this list is non-empty, then there are restrictions on what other health check fields are supported and what other resources can use this health check: - SSL, HTTP2, and GRPC protocols are not supported. - The TCP request field is not supported. - The proxyHeader field for HTTP, HTTPS, and TCP is not supported. - The checkIntervalSec field must be at least 30. - The health check cannot be used with BackendService nor with managed instance group auto-healing.
827
+
"A String",
828
+
],
814
829
"sslHealthCheck": {
815
830
"port": 42, # The TCP port number to which the health check prober sends packets. The default value is 443. Valid values are 1 through 65535.
816
831
"portName": "A String", # Not supported.
@@ -1017,6 +1032,9 @@ <h3>Method Details</h3>
1017
1032
"region": "A String", # [Output Only] Region where the health check resides. Not applicable to global health checks.
1018
1033
"selfLink": "A String", # [Output Only] Server-defined URL for the resource.
1019
1034
"selfLinkWithId": "A String", # [Output Only] Server-defined URL for this resource with the resource id.
1035
+
"sourceRegions": [ # The list of cloud regions from which health checks are performed. If any regions are specified, then exactly 3 regions should be specified. The region names must be valid names of GCP regions. This can only be set for global health check. If this list is non-empty, then there are restrictions on what other health check fields are supported and what other resources can use this health check: - SSL, HTTP2, and GRPC protocols are not supported. - The TCP request field is not supported. - The proxyHeader field for HTTP, HTTPS, and TCP is not supported. - The checkIntervalSec field must be at least 30. - The health check cannot be used with BackendService nor with managed instance group auto-healing.
1036
+
"A String",
1037
+
],
1020
1038
"sslHealthCheck": {
1021
1039
"port": 42, # The TCP port number to which the health check prober sends packets. The default value is 443. Valid values are 1 through 65535.
1022
1040
"portName": "A String", # Not supported.
0 commit comments